Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices., , , and . AFRICACRYPT, volume 6055 of Lecture Notes in Computer Science, page 279-296. Springer, (2010)Physical Attacks and Beyond.. SAC, volume 10532 of Lecture Notes in Computer Science, page 3-13. Springer, (2016)An EDA-friendly protection scheme against side-channel attacks., , , , , and . DATE, page 410-415. EDA Consortium San Jose, CA, USA / ACM DL, (2013)Towards Secure Composition of Integrated Circuits and Electronic Systems: On the Role of EDA., , , , , , , , , and 3 other author(s). DATE, page 508-513. IEEE, (2020)A reconfigurable multiprocessor architecture for a reliable face recognition implementation., , , , and . DATE, page 319-322. IEEE Computer Society, (2010)The role of mechano-electric feedbacks and hemodynamic coupling in scar-related ventricular tachycardia., , , , , and . Comput. Biol. Medicine, (2022)Embedded Systems Education: Job Market Expectations., , , and . WESE, page 3:1-3:5. ACM, (2014)A cardiac electromechanical model coupled with a lumped-parameter model for closed-loop blood circulation., , , , , and . J. Comput. Phys., (2022)A Deeper Look at the Energy Consumption of Lightweight Block Ciphers., , , and . DATE, page 170-175. IEEE, (2021)Accelerating differential power analysis on heterogeneous systems., , , and . WESS, page 4:1-4:9. ACM, (2014)